Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:47 AM

Broadcom Debuts RFID

Broadcom Corporation introduced the world's first secure processor with integrated radio frequency identification (RFID) technology

IRVINE, Calif. -- Broadcom Corporation (NASDAQ:BRCM), a global leader in semiconductors for wired and wireless communications, today introduced the world's first secure processor with integrated radio frequency identification (RFID) technology, as part of the company's Trusted Authentication Initiative. The new device is designed to secure personal authentication transactions associated with physical access, logical access (into a PC or network) and contactless payment applications. The secure processor also enhances the use of currently deployed authentication technologies, such as biometrics and contactless technologies, by eliminating some of their inherent security vulnerabilities.

Personal authentication is a part of daily life -- people present "credentials" to prove their identity and gain access to a place or thing.

In today's world, transactions for physical access, logical access and financial payment are increasingly becoming digital, and thus, our identity has become a collection of electronic bits. While enabling unprecedented levels of convenience, digital transactions inherently expose individuals and companies to greater risk of identity theft, invasion of privacy and physical harm. Though encryption and biometrics have given users a sense of security, in reality, it has pushed attackers towards weaker and more vulnerable parts of the network. In a world dominated by cyber fraud and terrorism headlines, system manufacturers know that they have to eliminate security vulnerabilities.

Announced today is the new Broadcom(R) BCM5890 secure processor, which helps solve these problems by providing a secure processing environment for protecting sensitive transactions. Authentication operations are too often handled on an open processor that is vulnerable to attack. The BCM5890 secure processor is different. It runs in a special secure mode that protects the software, and the security keys that run on it, from tampering or theft. Any system that implements authentication measures, such as biometrics and contactless technologies, will benefit from the use of the BCM5890 secure processor.

"Our society has become quite comfortable with our digital identities, yet in the pursuit of convenience we have opened ourselves up to identify theft and loss of privacy," said Joseph Wallace, Senior Director for Broadcom's Security Line of Business. "Broadcom is committed to providing the technology that joins security with convenience for such applications as physical access, logical access and financial payments."

Broadcom Corp. (Nasdaq: BRCM)

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-13
A UXSS was discovered in the Thanos-Soft Cheetah Browser in Android 1.2.0 due to the inadequate filter of the intent scheme. This resulted in Cross-site scripting on the cheetah browser in any website.
PUBLISHED: 2021-04-13
The Motorola MH702x devices, prior to version, do not properly verify the server certificate during communication with the support server which could lead to the communication channel being accessible by an attacker.
PUBLISHED: 2021-04-13
A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version, that could allow unauthorized access to the driver's device object.
PUBLISHED: 2021-04-13
A null pointer dereference vulnerability in Lenovo Power Management Driver for Windows 10, prior to version, that could cause systems to experience a blue screen error.
PUBLISHED: 2021-04-13
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.